1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
3 years ago
15

How many bits are necessary for a binary representation (unsigned) of:

Computers and Technology
1 answer:
pshichka [43]3 years ago
4 0

Answer:

Hi!

The answer to:

a. 6 bits.

b. 9 bits.

c. 26 bits.

Explanation:

a. For the states of the U.S.A, you need 50 or more combinations to represents each element.

<u>If you use 6 bits, the possible combinations are 2⁶ = 64.  </u>

b. For days in a year, you need 365 or more combinations to represents each element.

<u>If you use 9 bits, the possible combinations are 2⁹ = 512. </u>

c. For inhabitants of California, you need 36,457,549 or more combinations to represents each element.

<u>If you use 26 bits, the possible combinations are 2²⁶ = 67,108,864.</u> If you use 25 bits instead of 26, then you have 2²⁵ = 33,554,432 combinations. These possible combinations are not enough to represent each inhabitant.

You might be interested in
A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information.
ratelena [41]

Answer:

a) Generate a new public and private key

Explanation:

You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.

The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.

Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.

8 0
3 years ago
A _________ is a series of commands and instructions that you group together as a single command to accomplish a task automatica
melamori03 [73]
A macro is a series of commands and instructions that you group together as a single command to accomplish a task automatically.
8 0
4 years ago
What purpose would tracking changes be most useful for?
olya-2409 [2.1K]
So, you can be able to make a prediction and understand the cycle.
6 0
3 years ago
if you wanted to predict the value of the y variable when the x variable is 15, you would be _____ the data. correlating extrapo
Simora [160]

interpret is my answer


3 0
3 years ago
Read 2 more answers
For most usb devices, power is supplied via ____.
ser-zykov [4K]

For most usb devices, power is supplied via the port.

3 0
3 years ago
Other questions:
  • In scratch the location of a sprite is defined by what?
    10·1 answer
  • You have been asked to create a Community leveraging Out-of-the-box login, logout, self-registration, and error pages. Would you
    5·1 answer
  • In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures and processe
    8·1 answer
  • Assuming the Direct Hashing function and the Subtraction preprocessing algorithm is used to map keys into indices, give the inde
    15·1 answer
  • WHAT DOES INFORMATION TECHNOLOGY DO??<br> Do they offer services or products
    15·1 answer
  • Tell the story, step by step, of how your computer finds the CodeHS server,
    9·1 answer
  • Which of the following are acceptable to share? Check all of the boxes that apply.
    13·1 answer
  • What is incorrect about the following code? Suggest a possible revision of the code to correct the error.
    13·1 answer
  • HELP<br> When differentiating data, the WHAT of the data is:
    11·1 answer
  • Write a program that produces the following output: CCCCCCCCC ++ ++ CC ++ ++ CC ++++++++++++++ +++++++++++++++ CC ++++++++++++++
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!